<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Victim Of Crime - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/categories/victim-of-crime/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/categories/victim-of-crime/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Tue, 25 Feb 2025 15:31:37 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[TITLE IX: Accused of sexual misconduct, harassment, or rape at a university?]]></title>
                <link>https://www.conawayandstrickler.com/blog/title-ix-accused-of-sexual-misconduct-harassment-or-rape-at-a-university/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/title-ix-accused-of-sexual-misconduct-harassment-or-rape-at-a-university/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 10 Aug 2024 21:43:22 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                    <category><![CDATA[Title IX]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                    <category><![CDATA[Education law attorney]]></category>
                
                    <category><![CDATA[sexual misconduct]]></category>
                
                    <category><![CDATA[TItle IX]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2024/08/title-ix-IMG_3578.png" />
                
                <description><![CDATA[<p>The investigation and hearing process for those accused of Title IX complaints can be a harrowing process. It is important to know that you may not only be facing a reprimand, suspension or expulsion (and a permanent notation on your academic record) but you also could be facing criminal charges. It is also important to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The investigation and hearing process for those accused of <a href="https://www.justice.gov/crt/title-ix" rel="noopener noreferrer" target="_blank">Title IX</a> complaints can be a harrowing process.  It is important to know that you may not only be facing a reprimand, suspension or expulsion (and a permanent notation on your academic record) but you also could be facing criminal charges. It is also important to note that additional <a href="https://www2.ed.gov/about/offices/list/ocr/docs/t9-unofficial-final-rule-2024.pdf" rel="noopener noreferrer" target="_blank">final regulations of Title IX</a> became effective August 1, 2024.  These changes modified key aspects of Title IX including the role of the advisor.  It is therefore very important to fully understand Title IX procedures and securing the right advisor is critical to protecting yourself now and in the future.</p>


<p>Here are some basic terms of the process:</p>


<p>Complainant: the individual(s) making the allegation</p>


<p>Respondent: the individual(s) against whom the allegation is made who is responding to the allegation</p>


<p>Witness: an individual who has direct knowledge of or information about the allegation being made</p>


<p>Investigator: the individual charged with gathering information, including statements of the complainant, the respondent and witnesses, documents, texts, photos, pictures, images, and recordings, analyzing the information gathered, and determining by a preponderance of the evidence what happened.</p>


<p><strong>Advisor</strong>: This is where we come in, we will be your formal advisor on the entire process.</p>


<p>Preponderance: the standard against which information and evidence gathered during the investigation is assessed. The preponderance of evidence standard means “more likely than not.”</p>


<p>The hearings and investigative process is nothing like the criminal justice system. The standard of proof is much lower and court evidence rules are not utilized. The process also moves really quickly. So, <a href="https://www.conawayandstrickler.com/contact-us.html?gclid=Cj0KCQjwn9y1BhC2ARIsAG5IY-6UMu_bppbGwR8re8UlLlv3u-vNzN9n8I_SydlTLcOiNAAwaIuAXdAaArn3EALw_wcB">contact</a> a knowledgeable education law attorney at Conaway & Strickler, PC to represent you in these proceedings.</p>


<p>Here is a short overview of the process:
</p>


<ul class="wp-block-list">
<li>A<em> complaint </em>is filed alleging misconduct or some sort of violation on your part.</li>
<li><em>The complaint is reviewed. </em>You may be contacted for an informal discussion, especially if the allegation is a mild infraction, and in some cases, the issue may be resolved here.</li>
<li><em>An investigation is conducted.</em>This may be a Dean, a Conduct Officer, an Honor Council, an Academic Progress Committee, an investigator etc.</li>
<li><em>An investigative final report is prepared.  </em> Statements and other supporting documents are collected/reviewed.</li>
<li><em> Formal hearing is scheduled.  </em>Each side can “testify'” along with any witnesses.</li>
<li><em>The disciplinary panel will make a determination and recommendation of punishment.</em></li>
<li><em>The student will be notified in writing of the punishment.</em></li>
<li><em>The student will have a window of time to appeal, if applicable.</em></li>
<li><em>There may be a separate appeals hearing, after which the decision will be final.</em></li>
</ul>


<p>
Conaway & Strickler will help students navigating the Title IX process in all undergraduate and graduate arenas nationwide. Contact us now to discuss in more detail.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Bitcoin/Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 12 Apr 2023 15:30:15 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services. Some believe that Bitcoin transactions are anonymous. There are,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services.  Some believe that Bitcoin transactions are anonymous.  There are, however, transaction records that are stored in the blockchain and publicly visible.  The FBI recently <a href="https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency" rel="noopener noreferrer" target="_blank">stated </a>“Criminals always leave tracks, and …[this] is a reminder that the FBI has the tools to follow the digital trail, wherever it may lead” .</p>


<p>Bitcoin is definitely attractive to money launderers because it is a decentralized currency that is not subject to government regulation. This makes it difficult, but not impossible, to track and trace Bitcoin transactions. Additionally, Bitcoin is often used in online transactions, which makes it easy to conceal the identity of the sender and receiver.</p>


<p>There are a number of ways to launder money using Bitcoin. One common method is to use a mixer, which is a service that mixes Bitcoin from multiple sources together. This makes it difficult to trace the original source of the Bitcoin. Another method is to use a tumbler, which is a service that breaks up Bitcoin transactions into smaller pieces and then reassembles them. This makes it difficult to track the individual transactions.</p>


<p>Bitcoin can also be used to purchase goods or services that are difficult to trace, such as drugs or weapons. This can make it difficult to identify the source of the funds used to purchase the goods or services.</p>


<p>Money laundering is a serious crime that can have a significant impact on the economy. It can also be used to finance terrorism and other criminal activities. Conaway & Strickler can help if the government is questioning you about or charging you with money laundering /wire fraud /bank fraud charges.</p>


<p>A lot of the times a money mule is utilized in money laundering schemes.  A money mule is a person who transfers money on behalf of someone else, often without knowing that they are involved in a criminal activity. Money mules are typically recruited through online job scams, romance scams, or other fraudulent schemes. They are then asked to receive money from criminals, often through wire transfers or cryptocurrency transactions. The money is then transferred to other accounts, or used to purchase goods or services.</p>


<p>Money mules are often unaware that they are involved in a criminal activity. They may be promised a share of the money, or they may be led to believe that they are helping someone in need. However, money mules are always at risk of being caught and prosecuted. They may also face financial losses, as they may be held responsible for any money that is stolen from the criminals.  The government often goes after these low end cases and prosecutes them federally.</p>


<p>Again, <a href="/contact-us/">contact us</a> immediately if you are being questioned by a federal agent about any of these issues.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[After a Data Breach, What to Do?]]></title>
                <link>https://www.conawayandstrickler.com/blog/after-a-data-breach-what-to-do/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/after-a-data-breach-what-to-do/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 14 May 2020 19:47:43 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                
                
                <description><![CDATA[<p>After the Hack: A Data Breach Post Game Show As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week. She and the other panelists discuss: Please watch here: https://lnkd.in/gjHgVWt</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-after-the-hack-a-data-breach-post-game-show">After the Hack: A Data Breach Post Game Show</h2>



<p>As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week.  She and the other panelists discuss:</p>



<ol class="wp-block-list">
<li>The criminal charge of BEC (Business email compromise) fraud</li>



<li>Representing a victim of BEC</li>



<li>Theft of trade secrets</li>



<li>Representing a victim of theft of trade secrets by a disgruntled employee or insider</li>



<li>Protecting small companies from potential hacks/ data breaches</li>



<li>Contacting law enforcement after a hack/breach</li>



<li>Commencing civil litigation in an attempt at restitution</li>



<li>Aggravated identity theft</li>



<li>Protection of PII</li>



<li>Cyber insurance</li>
</ol>



<p>Please watch here: <a href="https://lnkd.in/gjHgVWt" rel="noopener noreferrer" target="_blank">https://lnkd.in/gjHgVWt</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Victim of Crime – Criminal Negligence]]></title>
                <link>https://www.conawayandstrickler.com/blog/victim_of_crime_-_criminal_negligence/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/victim_of_crime_-_criminal_negligence/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 30 Jan 2018 14:08:13 GMT</pubDate>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                
                
                <description><![CDATA[<p>Victim of Crime: 11Alive/NBC News #TheLateFeed: Why are there no charges after vet died in nursing home? Please see the video here Meg Strickler discusses the possible charges against a nursing home in Georgia including felony murder, perjury, criminal negligence, elder abuse and obstruction. As per the article “An 11Alive investigation uncovered hidden camera video catching nursing&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><strong>Victim of Crime</strong>: 11Alive/NBC News #TheLateFeed: Why are there no charges after vet died in nursing home? Please see the video <a href="http://www.11alive.com/video/news/local/thelatefeed-why-are-there-no-charges-after-vet-died-in-nursing-home/85-2800847" target="_blank" rel="noreferrer noopener">here</a> Meg Strickler discusses the possible charges against a nursing home in Georgia including felony murder, perjury, criminal negligence, elder abuse and obstruction.</p>



<p>
As per the <a href="http://www.11alive.com/article/news/investigations/hidden-camera-tells-true-story-of-how-veteran-died-after-calling-for-help-gasping-for-air/85-490859558" rel="noopener noreferrer" target="_blank">article</a> “An 11Alive investigation uncovered hidden camera video catching nursing home staff laughing while an elderly patient dies in front of them. The incident happened at the Northeast Atlanta Health and Rehabilitation in 2014, but the video was recently released as part of a lawsuit filed by the family.
</p>



<p>Attorneys representing the Atlanta nursing home tried to prevent 11Alive from obtaining the video. They asked a DeKalb County judge to keep the video sealed and then attempted to appeal to the Georgia State Supreme Court. The judge ruled in favor of 11Alive and the nursing home eventually dropped its appeal to the state’s highest court.  The video includes almost six hours of video court deposition from a nursing supervisor explaining how she responded to the patient before she knew the hidden camera video existed. The video shows a completely different response.</p>



<p>The deceased patient is 89-year-old James Dempsey, a decorated World War II veteran from Woodstock, Georgia.”</p>



<p>
Conaway & Strickler can also help you if you are victim and need help prosecuting the case.  We have strong relationships with law enforcement and more importantly know how to prosecute the case. We know what charges will fit the crime and we know how to get the government to listen to you and bring charges.  Please see other blog entries here.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>